Me too. I drive a 2004 Mercedes-Benz S55 AMG. It's got a supercharged 5.5L V8 that makes 491 horsepower and will go from 0-60 in 4.7 seconds, with an electronically-limited top speed of 155 mph. It's scary fast and I fall in love with it every time I drive it.
Kelley Blue Book value in very good condition? $8,941
mattOzan writes: When data centers first opened in the 1990s, the tenants paid for space to plug in their servers with a proviso that electricity would be available. As computing power has soared, so has the need for electricity, turning that relationship on its head: electrical capacity is often the central element of lease agreements, and space is secondary. While lease arrangements are often written in the language of real estate, they are essentially power deals. Link to Original Source
An anonymous reader writes: A renowned archaeologist has said people must start considering the ethical issues surrounding bringing extinct animals back to life as scientists are "on the brink" of doing so.
Dr Alice Roberts, an archaeologist and professor who has also appeared on several TV shows, says the dilemmas in bringing animals back from the dead should be "grappled with" as scientists begin to make further breakthroughs. Link to Original Source
alphadogg writes: Hackers could use vulnerable charging stations to prevent the charging of electric vehicles in a certain area, or possibly even use the vulnerabilities to cripple parts of the electricity grid, a security researcher said during the Hack in the Box conference in Amsterdam on Thursday. While electric cars and EV charging systems are still in their infancy, they could become a more common way to travel within the next 10 years. If that happens, it is important that the charging systems popping up in cities around the world are secure in order to prevent attackers from accessing and tempering with them, said Ofer Shezaf, of HP ArcSight. At the moment, they are not secure at all, he said. Link to Original Source
Nerval's Lobster writes: Kaspersky Lab has completed a detailed analysis of “Winnti,” a group of Asian hackers who target servers hosted by gaming companies, copying their source code and surreptitiously stealing money or virtual goods over time. In findings published April 10, the security firm said it had completed the latest phase of its eighteen-month investigation. A more detailed account of an actual attacks was published separately (PDF). Winnti has attacked two gaming companies in North America, two in Germany, two in Russia, and fourteen in South Korea. Although the Winnti group has been around for years, it first came to light in 2011, when Trojans began appearing on the PCs of users playing MMORPGs, online computer games which usually require a monthly subscription. Those Trojans, which included RAT (Remote Administration Tool) functionality, had been “signed” with the digital certificate of KOG, a South Korean gaming company. In the course of its investigation, Kaspersky discovered that the gaming companies (which often share resources, partner, and subcontract out work to one another) had provided an opportunity for the Winnti team to secure access to otherwise legitimate digital certificates, which could be used to sign malware. Malware signed by Japanese gaming company YNK Japan was used to attack the servers of social networks Cyworld and Nate in South Korea in 2011. Link to Original Source
tad001 writes: There is a story up on Wired about encoding messages into your Facebook pics. We know about the practice of concealing messages inside computer files (steganography) but hiding things in Facebook pictures is hard because they compress the image.
For now only Chrome users can a have a browser extension (released this week by 21-year-old Oxford University computer science student and former Google intern Owen-Campbell Moore) that will work.
sciencehabit writes: Researchers have developed a camera system that shoots untouched flakes "in the wild" as they fall from the sky. By grabbing a series of images of the tumbling crystals—its exposure time is one-40,000th of a second, compared with about one-200th in normal photography—the camera is revealing the true shape diversity of snowflakes. Besides providing beautiful real-time 3D snowflake photographs from a ski resort in Utah, the goal is to improve weather modeling. More accurate data on how fast snowflakes fall and how their shapes interacts with radar will improve predictions of when and where storms will dump snow and how much. Link to Original Source
Fnord666 writes: Despite the pervasiveness of law enforcement surveillance of digital communication, the FBI still has a difficult time monitoring Gmail, Google Voice, and Dropbox in real time. But that may change soon, because the bureau says it has made gaining more powers to wiretap all forms of Internet conversation and cloud storage a “top priority” this year. Link to Original Source
fish waffle writes: Suspecting that their strongly branded "Athiest" products may be treated differently by more religiously-oriented postal regions, Kickstarter success Athiest Shoes conducted an experiment. They sent 178 envelopes to 89 people in different parts of the US, each person receiving one envelope prominently branded as "Athiest" merchandise, and one not. The results: packages with the athiest label were nearly 10 times more likely to never be received, and took on average 3 days longer to show up when they did. Control experiments were also done in Europe and Germany---it's definitely a USPS problem. Link to Original Source
An anonymous reader writes: Despite obesity being quite an obvious health complication, doctors state that not only can obesity be physically noticeable, it can also be detectable through the human breath. According to medical professionals from the Cedars-Sinai Medical Center in Los Angeles, CA, there are certain living organisms in the stomach that can help predict someone's risk of developing obesity. These microorganisms emit an odor that can help doctors prescreen patients for obesity based on a simple breath test. Link to Original Source